StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Email and Internet use and Privacy Policies - Essay Example

Cite this document
Summary
In this age of technology it is an admitted fact that the basic purpose of using Internet, email and voice mail at corporation is for carrying out business activities. Additionally, a number of job related tasks at the Corporation need the way in to the Internet and the utilization of some particular software besides the Microsoft Office group of software…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Email and Internet use and Privacy Policies
Read Text Preview

Extract of sample "Email and Internet use and Privacy Policies"

?EMAIL AND INTERNET USE AND PRIVACY POLICIES Email and Internet use and Privacy Policies Affiliation E-mail use, Internet use, andprivacy policies: In this age of technology it is an admitted fact that the basic purpose of using Internet, email and voice mail at corporation is for carrying out business activities. Additionally, a number of job related tasks at the Corporation need the way in to the Internet and the utilization of some particular software besides the Microsoft Office group of software. Moreover, the use of internet in working hours is allowed to complete business tasks. However, the use of internet brings the likelihood of contravenes to the safety of secret Company details. Moreover, internet use also causes contagion to our business structure with several spyware, malwares, Trojan horses and viruses. At my job, Email is utilized for performing business activities. However, the private information of the company should not be given away from the Company, without the approval from the company management. Additionally, it is not ethical to perform private dealings using Company PC or electronic mail (Boze & Stevens, 2010; Heathfield, 2011). Employees should keep in mind that the company keeps the record of several communications done using electronic mail or else whatever is shared on company PC. In this scenario, network administration and authorized employees have the full right to view any content in employee’s electronic mail or on employee’s PC whenever they want. Thus, people should not think that their electronic link, storage or access to be confidential if it is managed or stored at work. Furthermore, in the place of work current developments have altered the ways workers make use of the internet and electronic mail. Thus, the businesses are confining their workers’ use of Internet and email with privacy policies (Boze & Stevens, 2010; Heathfield, 2011). What are the current laws regulating employee e-mail and Internet privacy? A lot of businesses are using the pre-established rules those confine internet and electronic mail usage for workers. In this scenario, these businesses apply privacy rules that bound the extent of privacy workers are allowed to even as in the office. Additionally, the managers are answerable for the acts of their workers or staff. Thus, most of the businesses believe that privacy of the company should have priority over worker’s privacy at the place of work. In this scenario, businesses apply rules and laws on the internet and e-mail usage in order to defend the company beside robbery, permissible concerns, and maintain the reliability and reputation of the business (OPPapers, 2010; eNotes.com, Inc., 2011; FindLaw, 2011). In this scenario, existing laws those are regulating workers’ internet and e-mail privacy vary from country to country. However, the prime initiative of these laws describe that boss or manager who holds the e-mail framework, internet setup or networks is perfect inside their privileges to check the access to internet or e-mail in addition to practice by the staff. In this scenario, the electronic mails are managed through the Electronic Communications Privacy Act (ECPA) and the Patriot Act. So over internet the ECPA secures together digital communications as well as electronic mail. Furthermore, the law prohibits their stoppage and detection by 3rd party. In this regard, ECPA outlined a number of distinct crimes: (OPPapers, 2010; eNotes.com, Inc., 2011; FindLaw, 2011) Accessing and trying to interrupt transmission Open connection to the transmission without approval Stopping the transmission for the reason of hindering illegal analysis Capturing communication for business operations Making use of electronic, automatic, or else extra equipment to cut off transmission What assumptions might employees make about their privacy at work? How do these policies affect employee privacy at work? The biggest concern for the majority owners or managers is legal responsibility.  However, nuisance proceedings of office are common, and one useful way to secure a business from being accused is to observe and prevent several nuisances in the initial stage.  In this scenario, to deal with this situation, managers execute application suite which seeks out nasty expressions and greatly emphasizes challenging e-mails and other communication (FindLaw, 2011; Herold, 2009). According to Freedom of Information Act (FOIA), and people proceedings act the people are able to have access to approximately everything such as worker records or whatsoever he/she sends.  Generally employees make the following assumptions about their privacy at work: (FindLaw, 2011; Herold, 2009) Employees generally suppose that the business has established various measures to maintain the privacy policies have been placed on the websites related to their business. Employees think that retailers those have been subcontracted by the company for the purpose of management otherwise dispensation have protection prepared to secure the workplace. Employees as well think that everybody within the company recognizes about their website privacy procedures. Employees too suppose that each person inside the company identifies the details and information significant for the company. Employees think that the entire storage places intended for individually restricted details are competently recognized as well as acknowledged in an effective manner. Why do companies implement e-mail and Internet use policies? It is true when companies start to depend upon heavily on the internet technology, it can be observed that their staff spends an increasing amount of time in viewing web links and checking e-mails to competently maintain the business working. Thus, several businesses apply rules for internet and e-mail usage believing it an effort to control diverse rising issues: (eHow, 2010) Low Production: it was believed in 2000 that twenty five percent of staff spends a lot of time (even many hours) of their working timings on visiting diverse web pages that are not associated to their work or else to their business. Thus, by applying and imposing the usage policy of internet, a company could be able to stop workers from wasting most of their work time on disparate actions by proficiently using the internet technology (eHow, 2010). Logical Assets Stealing: While using internet or emails if an important information is sent wrongly or intentionally to an un-official person, or in case when the devices in the workplace have been attacked by various malware, Trojan horses, viruses and worms, in this scenario, these important details along with the sensitive information is able be pilfered and used in a wrong way. Thus, by applying an e-mail and Internet usage policy, the businesses could be able to secure its precious electronic resources and devices (eHow, 2010). Safety of Physical Resources: In any workplace, a virus attack on single PC can stop the functionality of a whole network infrastructure for a long time. So by applying an internet usage policy, business could be able to secure their systems from virus attacks that stop the functionality of resources (eHow, 2010). Management of Internet Expenses: All the departments of a business require sending and receiving large volumes of data by using internet technology during working timings. Thus, by stopping workers from spending time on other activities, a company could be able to assist in managing the charges of using internet link. But with the implementation of internet usage policy, all the data and information sent out will definitely be correct, perfect and business related (eHow, 2010). References Boze, B., & Stevens, S. (2010, June 10). Internet, E-Mail, And Privacy Policies. Retrieved March 19, 2011, from http://www.oppapers.com/essays/Internet-E-Mail-And-Privacy-Policies/355475 eHow. (2010, July 12). Why Do Companies Implement Email & Internet Use Policies? Retrieved March 18, 2011, from http://www.ehow.com/about_6725819_do-email-internet-use-policies_.html eNotes.com, Inc. (2011). Internet Privacy. Retrieved March 17, 2011, from http://www.enotes.com/everyday-law-encyclopedia/internet-privacy FindLaw. (2011). Your Email Isn't Private. Retrieved March 18, 2011, from http://public.findlaw.com/internet/email-privacy.html Heathfield, S. M. (2011). Internet and Email Policy. Retrieved March 19, 2011, from About.com: http://humanresources.about.com/od/policiesandsamples1/a/email_policy.htm Herold, R. (2009, July 27). 5 Dumb and Dangerous Privacy Assumptions. Retrieved March 18, 2011, from http://information-security-resources.com/2009/07/27/5-dumb-and-dangerous-privacy-assumptions/ OPPapers. (2010, April 26). Employee Privacy Report. Retrieved March 18, 2011, from http://www.oppapers.com/essays/Employee-Privacy-Report/507219 Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Email and Internet use and Privacy Policies Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1412165-write-a
(Email and Internet Use and Privacy Policies Essay)
https://studentshare.org/environmental-studies/1412165-write-a.
“Email and Internet Use and Privacy Policies Essay”, n.d. https://studentshare.org/environmental-studies/1412165-write-a.
  • Cited: 0 times

CHECK THESE SAMPLES OF Email and Internet use and Privacy Policies

The privacy of your medical records

Technology is methodically and increasingly stripping away the privacy of citizens which has led many to ask if corporate interests outweigh the autonomy of employees.... Employers argue that because they own the internet connection and computer system, they have not only the… Americans cherish their privacy and generally detest government intrusion into their private matters such as tapping their telephone However, many have come to accept that their employer has the right to essentially do the same thing by monitoring emails....
5 Pages (1250 words) Essay

Why and How Should Organizations Develop Comprehensive Email Policy

The direct and indirect use of computer technology in every sphere has made it extremely popular which has, in turn, made it highly susceptible for misuse by one and all, in the absence of any tangible means of control.... We would, therefore, be focusing on the urgent need for addressing the proper and efficient use of internet and email services in the organization that would help to develop internet and email policy to effectively monitor its use....
5 Pages (1250 words) Term Paper

Contribution of Internet Use to Privacy

Contribution of internet use to Privacy College This research is being submitted on the for (course number) (name of course) Contribution of internet use to Privacy Most everything these days can be had, can be seen, and can be done online.... Broadcast and internet indecency: defining free speech....   Even with the appropriate legislative policies enacted by government authorities these measures still fail to protect people's privacy....
2 Pages (500 words) Essay

Email privacy

Like any other form of privacy invasion, there are some… A responsible employer monitors internet use by the workforce.... responsible employer monitors internet use by the workforce.... Smart policies for Workplace Technologies: Email, Blogs, Cell Phones & More.... Employers are always terrified of Email privacy Currently, it is possible for an employer to monitor all the activities that occur in an organization.... Like any other form of privacy invasion, there are some advantages and disadvantages of employer monitoring....
1 Pages (250 words) Research Paper

The Advent of the Internet - A Boon or a Bane

ybercrime can be broadly defined as the crimes committed through the use of a computer network or information technology.... This paper "The Advent of the internet - A Boon or a Bane?... nbsp;… The advent of the internet has further shrunk the world into a global village and redefined the concept of distance and time.... he advent of the internet has redefined communication and has become one of the most powerful tools of information....
10 Pages (2500 words) Case Study

E-Mail, Internet Use, and Privacy Policies

This report examines email use, internet use and privacy policies at an organizational workplace.... E-mail and internet use among employees at the workplace have created issues that it is merely a time consuming and moreover, there can be issues of misuse as well.... Even though the internet can play the vital role in helping human resource management in performing various functions like recruiting, training and knowledge management, it also has negative sides of employee misuse of email and internet at workplaces When employees are at the workplace, the main emphasis is normally given on improving the overall productivity and employee performance....
4 Pages (1000 words) Assignment

The Privacy in the Workplace and the Use of Technology

This paper “The privacy in the Workplace and the Use of Technology” takes into account the major difficulty that exists between balancing the expectations of the employer and those of the employee.... Many across Australia have been carrying out discussions regarding the adequacy of workplace privacy laws (Pittard, 2003).... Progressive advances in technology, especially in the area of electronic communications (emails), have increased the capacity at which an employee can monitor the activities of a colleague or an employer monitoring the activities of an employee, yet the laws of privacy have not been stepped up....
18 Pages (4500 words) Term Paper

Internet Enhanced Concern on Data Mining, Internet Cookies, and Search Engines

The rise of internet use in daily life has led to privacy concerns.... The rise of internet use in daily life has led to privacy concerns (Smith, Dinev & Xu, 2011).... The privacy debate that has been raised by internet users is mostly based on the two issues known as internet-specific and internet enhanced concerns.... … The paper “Internet Enhanced Concern on Data Mining, Internet Cookies, Search Engines, and Google privacy Issues” is a  pathetic variant of an essay on information technology....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us